What do you expect to be the most significant challenge that SafeNet will face within the next five years?

The biggest obstacle is the ever-changing threat vector profile. While the industry is cognizant of the changes, the real challenge is going being recognition and staying one step ahead of the threat profile. The computing industry is massively changing. Cloud computing is a prime example. However, organizations continue to view security as an obstacle rather than an enabler to their business and tend to rely on past security frameworks. Right now, in my view, there is a real resistance to change in terms of how people approach information security.

There is widespread acknowledgment that a perimeter only approach is a dated one, and yet organizations continue to invest in it, as opposed to adapting and focusing more resources on protecting the data itself. People are generally aware that it is not very difficult for an unauthorized user to penetrate a corporate network, but they are not yet fully grasping the idea that every network breach must not be a full-scale breach of security.

What we’re trying to do is usher in a new era, in which the focus is on enabling the “secure breach,” in which security measures are designed intelligently around the acceptance that unauthorized users may well already be inside the network. Breaches don’t have to cause the same type of damage they’ve caused in the past; not if the valuable information is protected by encryption. You simply need to know what the hackers may be after and why, and deploy your resources accordingly. SafeNet’s data protection philosophy revolves around this idea. I believe that this is the direction the industry is taking, particularly as more and more information is being migrated to the cloud. People are talking about this idea, but are only now beginning to deploy their resources accordingly.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.